-
Notifications
You must be signed in to change notification settings - Fork 134
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reboot/fix/OIDC auth introspect #3183
Conversation
Signed-off-by: Pablo Hernán Carle <[email protected]>
Signed-off-by: Pablo Hernán Carle <[email protected]>
@@ -112,35 +127,6 @@ Use the following procedure to enable the feature to use an OIDC Access Token as | |||
|
|||
## Troubleshooting |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we can refactor the current ones and mention that failure can occur if:
- JWK is not available or incorrectly configured.
- JWK was revoked by the authorization server and the update has not happened yet in the api ml (in this case configure better value for the refresh interval or restart api ml, or just wait)
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: ShobhaJayanna <[email protected]>
- After successful validation of all authentication factors, the OIDC provider grants the client an Access Token. | ||
- The client can then request from API ML Gateway the needed mainframe resources presenting the access token in the request. | ||
|
||
- The Gateway validates the access token. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this statement necessary? The next statement repeats this with additional information...
|
||
- The Gateway validates the access token. | ||
|
||
- The Gateway validates the access token by comparing the key id of the token against the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set using the property jwks_uri. If the access token is validated, the outcome is cached for a short time (20 sec by default). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Review this sentence. I suggest this be two sentences.
"the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set"
|
||
- The Gateway validates the access token by comparing the key id of the token against the key ids obtained from the authorization server's JWK keys endpoint,URL to end point should be set using the property jwks_uri. If the access token is validated, the outcome is cached for a short time (20 sec by default). | ||
|
||
- The JWK Keys obtained from the authorization server's endpoint are cached for a while to prevent the repeated calls to the endpoint. It can be set using the property jwks.refreshInternalHours (it's 1 hour by default) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Please make "for a while" more specific. Perhaps, " The JWK Keys obtained from the authorization server's endpoint can be cached for a specified interval to prevent the repeated calls to the endpoint."
Signed-off-by: Andrew Jandacek <[email protected]>
Signed-off-by: sj895092 <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed by the doc squad
Signed-off-by: ShobhaJayanna <[email protected]>
Your checklist for this pull request
🚨Please review the guidelines for contributing to this repository.
If the changes in this PR is part of the next future release, make this pull request against the docs-staging branch which will be published at the next release boundary. If the changes in this PR are part of the current release, use the default base branch, master. For more information about branches, see https://github.com/zowe/docs-site/tree/master#understanding-the-doc-branches.
If this PR relates to GitHub issues in
docs-site
or other repositories, please list in Description, prefixed with close, fix or resolve keywords.This PR is to update the OIDC documents with mechanism and new properties in OIDC to configure JWK keys location (obtained according to documentation from the authorization server's metadata)
New properties:
apiml.security.oidc.jwks.uri: URL to the JWK keys endpoint.
apiml.security.oidc.jwks.refreshInternalHours: hours to refresh the JWK keys.
❤️Thank you!